Sunday, July 21, 2024
EHA

Hacker Pleads Guilty For Stealing 132,000+ Users Data

Robert Purbeck, a hacker known as “Lifelock” and “Studmaster,”  hacked into the computer servers of the City of Newnan, a medical clinic in Griffin, and at least 17 other victims across the US. 

He stole the personal information of more than 132,000 individuals, pleaded guilty to federal charges of computer fraud and abuse and, breached computer systems nationwide, stole a massive amount of personal data, then extorted his victims by threatening to expose this sensitive information. 

The incident highlights the serious risk cyberattacks pose to healthcare facilities and government institutions.

Law enforcement is committed to working together to fight cybercrime and protect citizens’ personal information, read DoJ’s Press release.

The FBI’s Atlanta field office emphasizes its commitment to combating cybercrime and prioritizes apprehending cybercriminals and thwarting attacks on critical infrastructure.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

According to FBI Atlanta’s Special Agent in Charge, Keri Farley, the agency relentlessly pursues these criminals and disrupts their operations, ensuring they are brought to justice.

Focusing on victim safety translates to aggressive investigations, regardless of the criminals’ location, to hold them accountable under legal statutes.

Hacked into the Computer Servers 

Robert Purbeck engaged in cybercrime by acquiring unauthorized access to computer servers on the darknet marketplace, while in June 2017, he purchased access credentials for a Griffin, Georgia, medical clinic’s server. 

Using these stolen credentials, Purbeck infiltrated the clinic’s computer systems and exfiltrated sensitive personal information belonging to over 43,000 individuals, which included names, addresses, birthdates, and Social Security numbers. 

Nearly a year later, Purbeck repeated the offense by acquiring access to the City of Newnan, Georgia, Police Department’s server in February 2018. 

After gaining unauthorized entry, he stole police reports and documents containing the personal information of more than 14,000 people.  

In an FBI investigation on August 31st, 2019, a federal search warrant was executed at Purbeck’s residence in Meridian, Idaho, and the FBI seized multiple electronic devices containing the personal information of over 132,000 individuals. 

A blank Federal Search warrant form 

The data was obtained through multiple breaches targeting entities like the City of Newnan, the Griffin Medical Clinic, and at least 17 other victims across the US.

As part of a plea agreement, Purbeck agreed to compensate the victims by over $1 million. 

A resident of Meridian, Idaho, 44-year-old Purbeck, is scheduled for sentencing on June 18, 2024, at 10:30 am for the case involving hacking computer systems belonging to the City of Newnan and a Griffin medical clinic in Georgia. 

Chief U.S. District Judge Timothy C. Batten Sr. will preside over the sentencing at the United States Courthouse in Newnan, whereas the FBI Atlanta Field Office pursued the investigation with support from the FBI Boise, Idaho Resident Agency. 

Assistant U.S. Attorneys Michael Herskowitz, Nathan Kitchens, Alex Sistla, and Nicholas Evert, along with Trial Attorney Brian Mund from the U.S. Department of Justice Computer Crime and Intellectual Property Section, are leading the prosecution of a case, with significant support from the U.S. Attorney’s Office for the District of Idaho.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles